Kitchens - ISOM 210 - Test #2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What was passed to protect minors from accessing inappropriate material on the Internet?

Child Online Protection Act

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?

Click-fraud

Collective Intelligence

Collaborating and tapping into the core knowledge of all employees, partners, and customers. Knowledge can be a real competitive advantage for an organization. The most common form of collective intelligence found inside the organization is knowledge management (KM).

Asynchronous Communications

Communication such as email, in which the message and the response do not occur at the same time.

Synchronous Communication

Communications that occur at the same time. In business, continuous connections are now expected in today's collaborative world.

__________ click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

Competitive

__________ is the assurance that messages and information remain available only to those authorized to view them.

Confidentiality

Explicit Knowledge

Consists of anything that can be documented, archived, and codified, often with the help of MIS. Examples are assets such as patents, trademarks, business plans, marketing research, and customer lists.

Open System

Consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.

Source Code

Contains instructions written by a programmer specifying the actions to be performed by computer software.

Snackable Content

Content that is designed to be easy for readers to consume and to share. Captures website visitors' attention by offering small consumable pieces of information that can be quickly read and understood. Infographics, photos, and attention-grabbing headlines that ask questions or use humor play a critical part when attracting readers attention who are browsing and don't have the time or patience to consume long, text -heavy articles.

__________ is the legal protection afforded an expression of an idea, such as a song, book, or video game.

Copyright

_________ software is software that is manufactured to look like the real thing and sold as such.

Counterfeit

User-contributed Content

Created and updated by many users for many users. Websites such as Flickr, Wikipedia, and Youtube, for example, move control of online media from the hands of leaders to the hands of users.

What type of attack is identity theft?

Cyberattacks

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?

Cyberbullying

What involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organization, community, and at the national level?

Cybersecurity

What is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals?

Digital trust

What refers to a period of time when a system is unavailable?

Downtime

Select three epolicies.

Ethical computer use policy. Social media policy. Acceptable use policy.

________ are the principles and standards that guide our behavior toward other people.

Ethics

Wiki

Hawaiian for "quick." A type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required.

_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.

Privacy

Tags

Specific keywords or phrases incorporated into website content for means of classification or taxonomy. An item can have one to more tags associated with it to allow for multiple browsable paths through the items, and tags can be changed with minimal effort.

Website name ____________ is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

Stealing

Website Bookmark

A locally stored URL or the address of a file or Internet page saved as a shortcut.

Ezine

A magazine published only in electronic form on a computer network. Flipboard is a social network aggregation, magazine-format application software for multiple devices that collects content from social media and other websites, presents it in magazine format, and allows users to flip through the content.

Viral Marketing

A marketing phenomenon that facilitates and encourages people to pass along a marketing message.

A mail ______ sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning.

Bomb

Reputation System

Buyers post feedback on sellers. eBay buyers voluntarily comment on the quality of service, their satisfaction with the item traded, and promptness of shipping. Sellers comment about prompt payment from buyers or respond to comments left by the buyer.

What is the act of conforming, acquiescing, or yielding information?

Information compliance

Semantic Web

A component of Web 3.0 that describes things in a way that computers can understand. It is not about links between web pages; rather it describes the relationship between things (such as A is a part of B and Y is a member of Z) and the properties of things (size, weight, age, price). If information about music, cars, concert tickets, and so on is stored in a way that describes the information and associated resource files, semantic web applications can collect information from many sources, combine it, and present it to users in a meaningful way.

Hashtag

A keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#).

JavaScript

A scripting language developed by Netscape and used to create interactive websites, a big driver of Business 2.0.

Selfie

A self-photograph placed on a social media website.

Application Programming Interface (API)

A set of routines, protocols, and tools for building software applications. A programmer then puts these building blocks together.

Collaboration System

A set of tools that supports the work of teams or groups by facilitating the sharing and flow of information. Business 2.0's collaborative mind-set generates more information faster from a wider audience.

Real Simple Syndication (RSS)

A web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format.

Mashup

A website or web application that uses content from more than one source to create a completely new product or service. The term is typically used in the context of music; putting Jay-Z lyrics over a Radiohead song makes something old new. Content used in mashups is typically sourced from an application programming interface (API).

A(n) ___________ use policy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.

Acceptable

Social Bookmarking

Allows users to share, organize, search, and manage bookmarks.

Social Network

An application that connects people by matching profile information. Providing individuals with the ability to network is by far one of the greatest advantages of Business 2.0.

Web Blog

An online journal that allows users to post their own comments, graphics, and video. Unlike traditional HTML web pages, blog websites let writers communicate - and readers respond - on a regular basis through a simple yet customizable interface that does not require any programming.

Native Advertising

An online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement. One of the most popular forms of user-generated content is a reputation system.

Which policy simply states that email users will not send unsolicited emails?

Anti-spam policy

Closed Source

Any proprietary software licensed under exclusive legal right of the copyright holder.

What is the electronic defacing of an existing website?

Cybervandalism

Network Effect

Describes how products in a network increase in value to users as the number of users increases. The more users and content managers on a wiki, the greater the network effect because more users attract more contributors, whose work attracts more users, and so on.

Social Tagging

Describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or searching. The entire user community is invited to tag, and this essentially define, the content.

Bring your own ________ policy allows employees to use their personal mobile devices and computers to access enterprise data and applications.

Device

________ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Digital

Direct-to-Consumer (DTC)

Ebusiness model where companies build, market, sell, and ship their products themselves, without relying on traditional stores or intermediaries.

Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

Electronic discovery. Ediscovery.

Which privacy policy details the extent to which email messages may be read by others?

Email privacy policy

Which policy stating explicitly how, when, and where the company monitors its employees?

Employee monitoring policy

Which of the following are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

Epolicies

Select the three reasons why organizations should develop written epolicies.

Establish employee guidelines. Establish organizational rules. Establish employee procedures.

A(n) _________ computer use policy contains general principles to guide computer user behavior.

Ethical

_________ information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

Fair

What is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union(EU)?

General Data Protection Regulation (GDPR)

A user can opt _____ to receive emails by choosing to allow permissions to incoming emails.

In

____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

Information

What is a method or system of government for information management or control?

Information governance

What examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively?

Information management

Which epolicy contains general principles regarding information privacy?

Information privacy policy

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

Information security

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

Intellectual Property

A(n) _________ use policy contains general principles to guide the proper use of the Internet.

Internet

What occurs when a government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?

Internet censorship

Knowledge Management

Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions. The primary objective is to be sure that a company's knowledge of facts, sources of information, and solutions are readily available to all employees whenever it is needed.

Social Networking Analysis (SNA)

Maps group contacts (personal and professional) identifying who knows each other and who works together. In a company, it can provide a vision of how employees work together. It can also identify key experts with specific knowledge such as how to solve a complicated programming problem or launch a new product.

A contractual stipulation which ensures that ebusiness participants do not deny their online actions is called a __________ clause.

Nonrepudiation

What are users doing when they choose to deny permission to incoming emails?

Opt out

A(n) _________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

Patent

What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults?

Physical security

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

Pirated Software

Open Source

Refers to any software whose source code is made available free (not on a fee or licensing basis in ebusiness) for any third party to review and modify.

Social Media

Refers to websites that rely on user participation and user-contributed content, such as Facebook, Youtube, and LinkedIn.

Social Graphs

Represent the interconnection of relationships in a social network. Social networking sites can be especially useful to employers trying to find job candidates with unique or highly specialized skill sets that may be harder to locate in larger communities.

Folksonomy

Similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system. Using the collective power of a community to identify and classify content significantly lowers content categorization costs because there is no complicated nomenclature to learn. Users simply create and apply tags as they wish.

Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?

Social media manager

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?

Social media monitoring

Which policy outlines the corporate guidelines or principles governing employee online communications?

Social media policy

Deep Web

Sometimes called the invisible web, is the large part of the Internet that is inaccessible to conventional search engines. It is the portion of the web not indexed by search engines. Content includes email messages, chat messages, private content on social media sites, electronic bank statements, electronic health records, and other content that is accessible over the Internet but is not crawled and indexed by search engines such as Google or Bing. The term was coined by BrightPlanet in a 2001 white paper titled "The Deep Web: Surfacing Hidden Value" is often confused in the media with the term dark web.

Crowdfunding

Sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet. With Business 2.0, people can be continuously connected, a driving force behind collaboration. Traditional ebusiness communications were limited to face-to-face conversations and one-way technologies that used asynchronous communications.

________ is unsolicited email.

Spam

Knowledge Management System (KMS)

Supports the capture, organization, and dissemination of knowledge (i.e., know-how) throughout an organization. KMS can distribute an organization's knowledge base by interconnecting people and digitally gathering their expertise.

What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?

Teergrubing

Tacit Knowledge

The knowledge contained in people's heads. The challenge inherent in tacit knowledge is figuring out how to recognize, generate, share, and manage knowledge that resides in people's heads.

Crowdsourcing

The most common form of collective intelligence found outside the organization. Refers to the wisdom of the crowd. The idea that collective intelligence is greater than the sum of its individual parts has been around for a long time.

Web 2.0 (Business 2.0)

The next generation of Internet use - a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free. It encourages user participation and the formation of communities that contribute to the content. Technical skills are no longer required to use and publish information to the World Wide Web, eliminating entry barriers for online business.

Dark Web

The portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser. The key takeaway here is that the dark web is part of the deep web. Like deep web content, dark web content cannot be accessed by conventional search engines, but most often the reason dark web content remains inaccessible to search engines is because the content is illegal.

Social Networking

The practice of expanding your business and/or social contacts by constructing a personal network.

Microblogging

The practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages.

A(n) ________ is an act or object that poses a danger to assets.

Threat

True or false: Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence. Rule 41 originally granted a federal judge magistrate the authority to issue a warrant to search and seize a person or property located within that judge's district if the person or property is part of a criminal investigation or trial.

True

__________ is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Typosquatting

Mashup Editors

WYSIWYG (what-you-see-is-what-you-get) tools. They provide a visual interface to build a mashup, often allowing the user to drag and drop data points into a web application.

What is another term from data scraping?

Web scraping

What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed?

Workplace MIS monitoring


Ensembles d'études connexes

8th Grade English- ATTWN Vocabulary Sentences

View Set

5: Authentication/Identification

View Set

Digital Information Technology Study Guide Mod 2 DBA

View Set

Physics II, Test II: CH 21, 22, 23, 24, 25 (How to Solve)

View Set

Understanding of Music: Chapter 6 Musical Form

View Set

Lesson 2 Quiz- Chapter 2: Cryptography

View Set